By Topic

Mobile Computing, IEEE Transactions on

Issue 8 • Date Aug. 2009

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks: A Game-Theoretic Modeling Approach

    Publication Year: 2009, Page(s):1009 - 1022
    Cited by:  Papers (132)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1924 KB) | HTML iconHTML

    We consider the problem of spectrum trading with multiple licensed users (i.e., primary users) selling spectrum opportunities to multiple unlicensed users (i.e., secondary users). The secondary users can adapt the spectrum buying behavior (i.e., evolve) by observing the variations in price and quality of spectrum offered by the different primary users or primary service providers. The primary user... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • pDCS: Security and Privacy Support for Data-Centric Sensor Networks

    Publication Year: 2009, Page(s):1023 - 1038
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2364 KB) | HTML iconHTML

    The demand for efficient data dissemination/access techniques to find relevant data from within a sensor network has led to the development of data-centric sensor (DCS) networks, where the sensor data instead of sensor nodes are named based on attributes such as event type or geographic location. However, saving data inside a network also creates security problems due to the lack of tamper resista... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RandomCast: An Energy-Efficient Communication Scheme for Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):1039 - 1051
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2995 KB) | HTML iconHTML

    In mobile ad hoc networks (MANETs), every node overhears every data transmission occurring in its vicinity and thus, consumes energy unnecessarily. However, since some MANET routing protocols such as dynamic source routing (DSR) collect route information via overhearing, they would suffer if they are used in combination with 802.11 PSM. Allowing no overhearing may critically deteriorate the perfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Gen2-Based RFID Authentication Protocol for Security and Privacy

    Publication Year: 2009, Page(s):1052 - 1062
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1139 KB) | HTML iconHTML

    EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is transmitted in plaintext which makes the tag traceable and clonable. Several solutions have been proposed based on traditional encryption methods, such as symmetric or asymmetric ciphers, but they are not suitable for low-cost RFID tags. Recently, some ligh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of VoIP over Multiple Co-Located IEEE 802.11 Wireless LANs

    Publication Year: 2009, Page(s):1063 - 1076
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1938 KB) | HTML iconHTML

    IEEE 802.11 WLAN has high data rates (e.g., 11 Mbps for 802.11b and 54 Mbps for 802.11g), while voice streams of VoIP typically have low-data-rate requirements (e.g., 29.2 Kbps). One may, therefore, expect WLAN to be able to support a large number of VoIP sessions (e.g., 200 and 900 sessions in 802.11b and 802.11g, respectively). Prior work by one of the authors, however, indicated that 802.11 is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Planning of Wireless Sensor Networks: Energy-Efficient Clustering under the Joint Routing and Coverage Constraint

    Publication Year: 2009, Page(s):1077 - 1086
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1084 KB) | HTML iconHTML

    Minimizing energy dissipation and maximizing network lifetime are important issues in the design of applications and protocols for sensor networks. Energy-efficient sensor state planning consists in finding an optimal assignment of states to sensors in order to maximize network lifetime. For example, in area surveillance applications, only an optimal subset of sensors that fully covers the monitor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paired Measurement Localization: A Robust Approach for Wireless Localization

    Publication Year: 2009, Page(s):1087 - 1102
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3220 KB) | HTML iconHTML

    Location awareness remains the key for many potential future applications of distributed wireless ad hoc sensor networks (WSNs). While the location of a WSN node can be estimated by incorporating Global Positioning System (GPS) devices, it is not suitable to embed GPS receivers in every node considering the cost and size of these devices as well as from an optimization point of view. However, a sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking

    Publication Year: 2009, Page(s):1103 - 1116
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1872 KB) | HTML iconHTML

    For target tracking applications, wireless sensor nodes provide accurate information since they can be deployed and operated near the phenomenon. These sensing devices have the opportunity of collaboration among themselves to improve the target localization and tracking accuracies. An energy-efficient collaborative target tracking paradigm is developed for wireless sensor networks (WSNs). A mutual... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Existence of Data and Multiuser Diversities in Noncooperative Mobile Infostation Networks

    Publication Year: 2009, Page(s):1117 - 1131
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1616 KB) | HTML iconHTML

    The capacity of mobile Infostation network can be greatly increased, if, in addition to direct short-range communications between mobile nodes and fixed infostations, nodes also communicate amongst themselves whenever they meet. However, this requires cooperation among mobile nodes that are not necessarily spontaneous for commercial applications. We propose means to create opportunistic cooperatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations

    Publication Year: 2009, Page(s):1132 - 1147
    Cited by:  Papers (68)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1102 KB) | HTML iconHTML

    Communication networks are traditionally assumed to be connected. However, emerging wireless applications such as vehicular networks, pocket-switched networks, etc., coupled with volatile links, node mobility, and power outages, will require the network to operate despite frequent disconnections. To this end, opportunistic routing techniques have been proposed, where a node may store-and-carry a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society 2009 Membership Application

    Publication Year: 2009, Page(s):1148 - 1150
    Request permission for commercial reuse | PDF file iconPDF (328 KB)
    Freely Available from IEEE
  • CSDP Certification [advertisement]

    Publication Year: 2009, Page(s): 1151
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • IEEE Computer Society Digital Library [advertisement]

    Publication Year: 2009, Page(s): 1152
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • TMC Information for authors

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (335 KB)
    Freely Available from IEEE

Aims & Scope

Mobile Computing, as proposed in this Transactions, focuses on the key technical issues related to (a) architectures, (b) support services, (c) algorithm/protocol design and analysis, (d) mobile environments, (e) mobile communication systems, (f) applications, and (g) emerging technologies.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prasant Mohapatra
Interim Vice-Provost and CIO
Professor, Dept. Computer Science
University of California, Davis, USA
pmohapatra@ucdavis.edu